Show filters
847 Total Results
Displaying 411-420 of 847
Sort by:
Attacker Value
Unknown

CVE-2014-9322

Disclosure Date: December 17, 2014 (last updated October 05, 2023)
arch/x86/kernel/entry_64.S in the Linux kernel before 3.17.5 does not properly handle faults associated with the Stack Segment (SS) segment register, which allows local users to gain privileges by triggering an IRET instruction that leads to access to a GS Base address from the wrong space.
Attacker Value
Unknown

CVE-2014-5353

Disclosure Date: December 16, 2014 (last updated October 05, 2023)
The krb5_ldap_get_password_policy_from_dn function in plugins/kdb/ldap/libkdb_ldap/ldap_pwd_policy.c in MIT Kerberos 5 (aka krb5) before 1.13.1, when the KDC uses LDAP, allows remote authenticated users to cause a denial of service (daemon crash) via a successful LDAP query with no results, as demonstrated by using an incorrect object type for a password policy.
0
Attacker Value
Unknown

CVE-2014-8964

Disclosure Date: December 16, 2014 (last updated October 05, 2023)
Heap-based buffer overflow in PCRE 8.36 and earlier allows remote attackers to cause a denial of service (crash) or have other unspecified impact via a crafted regular expression, related to an assertion that allows zero repeats.
0
Attacker Value
Unknown

CVE-2014-8134

Disclosure Date: December 12, 2014 (last updated October 05, 2023)
The paravirt_ops_setup function in arch/x86/kernel/kvm.c in the Linux kernel through 3.18 uses an improper paravirt_enabled setting for KVM guest kernels, which makes it easier for guest OS users to bypass the ASLR protection mechanism via a crafted application that reads a 16-bit value.
Attacker Value
Unknown

CVE-2014-3646

Disclosure Date: November 10, 2014 (last updated October 05, 2023)
arch/x86/kvm/vmx.c in the KVM subsystem in the Linux kernel through 3.17.2 does not have an exit handler for the INVVPID instruction, which allows guest OS users to cause a denial of service (guest OS crash) via a crafted application.
Attacker Value
Unknown

CVE-2014-3690

Disclosure Date: November 10, 2014 (last updated October 05, 2023)
arch/x86/kvm/vmx.c in the KVM subsystem in the Linux kernel before 3.17.2 on Intel processors does not ensure that the value in the CR4 control register remains the same after a VM entry, which allows host OS users to kill arbitrary processes or cause a denial of service (system disruption) by leveraging /dev/kvm access, as demonstrated by PR_SET_TSC prctl calls within a modified copy of QEMU.
Attacker Value
Unknown

CVE-2014-8559

Disclosure Date: November 10, 2014 (last updated October 05, 2023)
The d_walk function in fs/dcache.c in the Linux kernel through 3.17.2 does not properly maintain the semantics of rename_lock, which allows local users to cause a denial of service (deadlock and system hang) via a crafted application.
Attacker Value
Unknown

CVE-2014-3647

Disclosure Date: November 10, 2014 (last updated October 05, 2023)
arch/x86/kvm/emulate.c in the KVM subsystem in the Linux kernel through 3.17.2 does not properly perform RIP changes, which allows guest OS users to cause a denial of service (guest OS crash) via a crafted application.
Attacker Value
Unknown

CVE-2014-8369

Disclosure Date: November 10, 2014 (last updated October 05, 2023)
The kvm_iommu_map_pages function in virt/kvm/iommu.c in the Linux kernel through 3.17.2 miscalculates the number of pages during the handling of a mapping failure, which allows guest OS users to cause a denial of service (host OS page unpinning) or possibly have unspecified other impact by leveraging guest OS privileges. NOTE: this vulnerability exists because of an incorrect fix for CVE-2014-3601.
Attacker Value
Unknown

CVE-2014-7826

Disclosure Date: November 10, 2014 (last updated October 05, 2023)
kernel/trace/trace_syscalls.c in the Linux kernel through 3.17.2 does not properly handle private syscall numbers during use of the ftrace subsystem, which allows local users to gain privileges or cause a denial of service (invalid pointer dereference) via a crafted application.